Please log in or register your details to continue shopping

If you are an Electrician or other Trade professional, please login or register below to purchase through your preferred wholesaler. If you a consumer building or renovating, please try our Clipsal@home site

Display Centre Legend

Choose the type of Clipsal experience that suits your needs - whether you're planning a major renovation or building your dream home, we've got the answer to your home electrical questions.

Tier

Premium Products

Dedicated Area

Dedicated Staff

Full Product Range

ClipSpec Consultations

Platinum

•

•

•

•

•

Gold

•

•

•

•

Silver

•

•

Bronze

•

Tier

Premium Products

•

•

•

•

Dedicated Area

•

•

•

Dedicated Staff

•

•

Full Product Range

•

ClipSpec Consultations

•

•

Platinum

These are our top of the line experience centres where you can go to touch and feel our full range of products. In both the State based Powerhouses and the SA Clipsal Showroom, you’ll find dedicated staff to help you plan your home electrical needs and answer all of your questions. Feel free to walk into the SA Clipsal Showroom to have a look around and then make an appointment in the showroom or at the Powerhouse for a Clipspec Consultation to discuss your home electrical plan. If you’re not in South Australia then please make an appointment to visit your local Powerhouse for your personal tour and Clipspec Consultation.

Gold

These are Clipsal displays that are hosted within an electrical wholesaler, showcasing a range of our premium products - in a dedicated consumer friendly area. They also feature working demonstrations of our home automation solutions and Clipspec Consultations are available in the branch, by appointment.

Silver

These Clipsal displays are also hosted within a dedicated area of an electrical wholesaler and showcase a range of our premium products. Clipspec Consultations are not available in the branch. Some branches are open on Saturday – please check before visiting.

Bronze

These Clipsal displays are hosted within an electrical wholesaler and showcase a selected range of our products. Friendly staff are on hand to answer your questions and some branches are open on Saturday mornings. For opening hours and specific product information, please check with the branch before visiting.

1) Within the DCE Desktop Client navigate to the System Menu and select Users and Device Group Access.
2) Click Add User Group...
3) Fill in the required/necessary User Group informaton.
4) Click the User Group Members tab.
5) Select (checked box) the Users that should be part of this group.
Local: Editing a User or User Group

1) Within the DCE Desktop Client navigate to the System Menu and select Users and Device Group Access.
2) Select (left-click once) a user or user group from the list and click Edit.
3) Edit the necessary information.
4) Click OK to save the changes.
​Local: Deleting Users / User Groups

1) Within the DCE Desktop Client navigate to the System Menu and select Users and Device Group Access.
2) Select (left-click once) the User or User Group.
3) Click Delete.
4) Confirm the username and click Yes to delete the user.
Local: Editing User or User Group Access Permissions

1) Within the DCE Desktop Client navigate to the System Menu and select Users and Device Group Access.
2) Click Device Group Access.
3) Select (left-click once) the user or user group within the left pane.
​4) Select (left-click once) a device group in the right pane.
5) Click Modify Device Group Access.
6) Select the desired radial buttons for Monitoring Access and Surveillance Access.
7) Click OK to save the changes.
Managing Remote UsersRemote: Adding an Authentication Server and Users/Groups​

1) Define a user within your AD/OpenLDAP server that will be used to make the connection.

NOTE: It is recommended that this user is set with a password that does not expire. If the password expires, no users that are authenticated through the connection that uses the expired credentials will be able to login. A local administrator user would need to be used to change the password for the bind user.

2) Within the DCE Desktop Client navigate to the System Menu and select Users and Device Group Access.
3) Click the Authentication Servers tab.
4) Click Add Authentication Server...

5) Enter the Bind User DN, which is the full path to bind user within the authentication server structure.

- The bind user DN is required to be entered with specific syntax, which is case sensitive. EX: cn=bind-user,cn=Users,dc=dcim,dc=apc,dc=com
- Your AD/LDAP administrator should be able to provide the information in the syntax needed.

6) Enter the Bind User Password, which is the password of the Bind User defined within Step 5.

7) Enter the Search Base where the users and groups are located within the AD/LDAP authentication server.

NOTE: The search base is required to be entered with specific syntax, which is case sensitive. EX: dc=dcim,dc=apc,dc=com

NOTE: If you are going to be adding an AD/LDAP group, the group(s) and users must be located within the search base.

8) Click Next.
9) Check the boxes next to the users and user groups. Select Finish.

NOTE: If using groups, you do not need to select the individual users.

1) Within the DCE Desktop Client navigate to the System Menu and select Users and Device Group Access.
2) Click Device Group Access.
3) Select (left-click once) the remote user or remote user group within the left pane.
​4) Select (left-click once) a device group in the right pane.
5) Click Modify Device Group Access.
6) Select the desired radial buttons for Monitoring Access and Surveillance Access.
7) Click OK to save the changes.
Remote: Deleting an Authentication Server

- In order to define permissions on a group scale with Remote Users and Remote User Group, defined within the AD/LDAP servers, must be used. Adding remote users to local user groups is not supported. This is working as designed.

AD/LDAP Search Base may be Too Large

- If only some remote users are able to login or binding during configuration takes too long (or produces an error) the search base may be too large.
- DCE supports search bases up to 10000 objects, including: Users, User Groups, Containers, etc.
- Multiple authentication servers can be created if the authentication server setup allows. Within each respective authentication server entry, the users and user groups must be in that respective search base.

AD/LDAP Users and User Groups must be within the same search base

- AD/LDAP users and user groups must exist within the same search base. If the users are located outside of the search base, they will be unable to authenticate, even if the user group has been selected within the authentication server settings. To correct the issue, ensure the serach base includes both the users and user groups. This is working as designed.

Active Directory Users must login using Pre-Windows 2000 Usernames

- Users must login using the Pre-Windows 2000 username (found within the Protperts of the User Object in Active Directory).
- The syntax of the user may be slightly different that the username used to log into other systems.
- The username case must be used exactly as shown within the Pre-Windows 2000 username.
- If there is a space within the username, try to log using quotes around the username, EX: "John Smith"

Active Directory Group Type

- If adding User Groups from Active Directory instead of individual user objects, the User Group CANNOT be a Global Group. Change the User Group type to Universal to resolve the issue.

Issues Binding to Search Base that Contains an Object starting with #

- AD objects that begin with a # can cause parsing issues within DCE. You will see an error if this happens that states 'Invalid Attribute.' Typically binding to a Search Base one container higher than the one that contains the object beginning with '#' will resolve the issue. However, you cannot select any AD Objects within the container that also contains the '#' object.

Users can no longer log into DCE after changing Active Directory or OpenLDAP structure.

- DCE records the specific structure of the authentication server search base. You will need to remove and readd the AD/LDAP user/group within the authentication server settings. This is working as designed.

- If the configured AD/OpenLDAP server goes offline or is decomissioned before the Authentication Server is removed from DCE, the groups added through the authentication server may not be able to be deleted. If possible, put the active directory user back on-line to process the deletion. Once communication can occur between the two systems, the Authentication Server entry can be removed.
- If the server cannot be brought back online with the same IP or server name, contact your local technical support for assistance.

- The error indicates that the client is unable to access the remote Authentication Server at the address/port provided.
- The client computer must have access on the network to the Authentication server as it is performing the connection during the configuration.
- When the configuration is finished the DCE appliance will connect to the Authentication Server(s) for user verification. The Client to Authentication Server connection is only used during configuration of the Authentication Server.